Search the dblp DataBase
Joos Vandewalle :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Antoon Bosselaers , René Govaerts , Joos Vandewalle Cryptography Within Phase I of the EEC-RACE Programme. [Citation Graph (0, 0)][DBLP ] Computer Security and Industrial Cryptography, 1991, pp:227-234 [Conf ] Bart Preneel , René Govaerts , Joos Vandewalle Information Authentication: Hash Functions and Digital Signatures. [Citation Graph (0, 0)][DBLP ] Computer Security and Industrial Cryptography, 1991, pp:87-131 [Conf ] Joos Vandewalle , René Govaerts , Bart Preneel Technical Approaches to Thwart Computer Fraud. [Citation Graph (0, 0)][DBLP ] Computer Security and Industrial Cryptography, 1991, pp:20-30 [Conf ] Jan Verschuren , René Govaerts , Joos Vandewalle ISO-OSI Security Architecture. [Citation Graph (0, 0)][DBLP ] Computer Security and Industrial Cryptography, 1991, pp:179-192 [Conf ] Jorge Nakahara Jr. , Bart Preneel , Joos Vandewalle The Biryukov-Demirci Attack on Reduced-Round Versions of IDEA and MESH Ciphers. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:98-109 [Conf ] Peter Antal , Geert Fannes , Bart De Moor , Joos Vandewalle , Yves Moreau , Dirk Timmerman Extended Bayesian Regression Models: A Symbiotic Application of Belief Networks and Multilayer Perceptrons for the Classification of Ovarian Tumors. [Citation Graph (0, 0)][DBLP ] AIME, 2001, pp:177-187 [Conf ] Siddika Berna Örs , Lejla Batina , Bart Preneel , Joos Vandewalle Hardware Implementation of an Elliptic Curve Processor over GF(p). [Citation Graph (0, 0)][DBLP ] ASAP, 2003, pp:433-443 [Conf ] Joan Daemen , Antoon Bosselaers , René Govaerts , Joos Vandewalle Collisions for Schnorr's Hash Function FFT-Hash Presented at Crypto '91. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:477-480 [Conf ] Joan Daemen , René Govaerts , Joos Vandewalle A Framework for the Design of One-Way Hash Functions Including Cryptanalysis of Damgård's One-Way Function Based on a Cellular Automaton. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:82-96 [Conf ] Bart Preneel , René Govaerts , Joos Vandewalle On the Power of Memory in the Design of Collision Resistant Hash Functions. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1992, pp:105-121 [Conf ] Bart Preneel , René Govaerts , Joos Vandewalle An Attack on Two Hash Functions by Zheng-Matsumoto-Imai. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1992, pp:535-538 [Conf ] Bart Van Rompay , Alex Biryukov , Bart Preneel , Joos Vandewalle Cryptanalysis of 3-Pass HAVAL. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:228-245 [Conf ] Erik De Win , Antoon Bosselaers , Servaas Vandenberghe , Peter De Gersem , Joos Vandewalle A Fast Software Implementation for Arithmetic Operations in GF(2n ). [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1996, pp:65-76 [Conf ] Bart Preneel , René Govaerts , Joos Vandewalle Differential Cryptanalysis of Hash Functions Based on Block Ciphers. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1993, pp:183-188 [Conf ] T. Herlea , Joris Claessens , Danny De Cock , Bart Preneel , Joos Vandewalle Secure Meeting Scheduling with agenTA. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2001, pp:- [Conf ] Cristian Radu , René Govaerts , Joos Vandewalle A Restrictive Blind Signature Scheme with Applications to Electronic Cash. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 1996, pp:196-207 [Conf ] Antoon Bosselaers , René Govaerts , Joos Vandewalle Comparison of Three Modular Reduction Functions. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:175-186 [Conf ] Antoon Bosselaers , René Govaerts , Joos Vandewalle Fast Hashing on the Pentium. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1996, pp:298-312 [Conf ] Joan Daemen , René Govaerts , Joos Vandewalle Weak Keys for IDEA. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:224-231 [Conf ] Bart Preneel , Antoon Bosselaers , René Govaerts , Joos Vandewalle A Chosen Text Attack on The Modified Cryptographic Checksum Algorithm of Cohen and Huang. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:154-163 [Conf ] Bart Preneel , René Govaerts , Joos Vandewalle Hash Functions Based on Block Ciphers: A Synthetic Approach. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:368-378 [Conf ] Marc Davio , Yvo Desmedt , Marc Fosseprez , René Govaerts , Jan Hulsbosch , Patrik Neutjens , Philippe Piret , Jean-Jacques Quisquater , Joos Vandewalle , Pascal Wouters Analytical Characteristics of the DES. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1983, pp:171-202 [Conf ] Jan Verschuren , René Govaerts , Joos Vandewalle Realization of the Bell-LaPadula Security Policy in an OSI-Distributed System using Asymmetric and Symmetric Cryptographic Algorithms. [Citation Graph (0, 0)][DBLP ] CSFW, 1992, pp:168-178 [Conf ] Gert Goossens , Joos Vandewalle , Hugo De Man Loop Optimization in Register-Transfer Scheduling for DSP-Systems. [Citation Graph (0, 0)][DBLP ] DAC, 1989, pp:826-831 [Conf ] Joris Claessens , Bart Preneel , Joos Vandewalle Secure Communication for Secure Agent-Based Electronic Commerce Applications. [Citation Graph (0, 0)][DBLP ] E-Commerce Agents, 2001, pp:180-190 [Conf ] Igor N. Aizenberg , Naum N. Aizenberg , Eugene S. Gotko , Joos Vandewalle Ultrasound medical image processing using cellular neural networks. [Citation Graph (0, 0)][DBLP ] ESANN, 1998, pp:315-320 [Conf ] Tony Van Gestel , Johan A. K. Suykens , Bart De Moor , Joos Vandewalle Automatic relevance determination for Least Squares Support Vector Machines classifiers. [Citation Graph (0, 0)][DBLP ] ESANN, 2001, pp:13-18 [Conf ] Luc Hoegaerts , Johan A. K. Suykens , Joos Vandewalle , Bart De Moor Kernel PLS variants for regression. [Citation Graph (0, 0)][DBLP ] ESANN, 2003, pp:200-208 [Conf ] Yves Moreau , Ellen Lerouge , Herman Verrelst , Joos Vandewalle , Christof Störmann , Peter Burge A hybrid system for fraud detection in mobile communications. [Citation Graph (0, 0)][DBLP ] ESANN, 1999, pp:447-454 [Conf ] Yves Moreau , Joos Vandewalle Composition methods for the integration of dynamical neural networks. [Citation Graph (0, 0)][DBLP ] ESANN, 1997, pp:- [Conf ] Yves Moreau , Joos Vandewalle To stop learning using the evidence. [Citation Graph (0, 0)][DBLP ] ESANN, 1998, pp:303-308 [Conf ] Johan A. K. Suykens , Lukas Lukas , Joos Vandewalle Sparse least squares Support Vector Machine classifiers. [Citation Graph (0, 0)][DBLP ] ESANN, 2000, pp:37-42 [Conf ] Johan A. K. Suykens , Joos Vandewalle The K.U.Leuven competition data: a challenge for advanced neural network techniques. [Citation Graph (0, 0)][DBLP ] ESANN, 2000, pp:299-304 [Conf ] Johan A. K. Suykens , Joos Vandewalle Improved generalization ability of neurocontrollers by imposing NLq stability constraints. [Citation Graph (0, 0)][DBLP ] ESANN, 1998, pp:99-104 [Conf ] Joan Daemen , René Govaerts , Joos Vandewalle A Hardware Design Model for Cryptographic Algorithms. [Citation Graph (0, 0)][DBLP ] ESORICS, 1992, pp:419-434 [Conf ] Lieven Vandenberghe , Shaohua Tan , Joos Vandewalle Cellular Neural Networks: Dynamic Properties and Adaptive Learning Algorithm. [Citation Graph (0, 0)][DBLP ] EURASIP Workshop, 1990, pp:141-150 [Conf ] Antoon Bosselaers , René Govaerts , Joos Vandewalle SHA: A Design for Parallel Architectures? [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1997, pp:348-362 [Conf ] Henri Cloetens , Yvo Desmedt , Luc Bierens , Joos Vandewalle , René Govaerts Additional Properties in the S-Boxes of the DES. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1986, pp:20- [Conf ] Joan Daemen , René Govaerts , Joos Vandewalle Resynchronization Weaknesses in Synchronous Stream Ciphers. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1993, pp:159-167 [Conf ] F. Jorissen , Joos Vandewalle , René Govaerts Extension of Brickell's Algorithm for Breaking High Density Knapsacks. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1987, pp:109-115 [Conf ] Frank Hoornaert , Marc Decroos , Joos Vandewalle , René Govaerts Fast RSA-Hardware: Dream or Reality? [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:257-264 [Conf ] Bart Preneel , René Govaerts , Joos Vandewalle Boolean Functions Satisfying Higher Order Propagation Criteria. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1991, pp:141-152 [Conf ] Bart Preneel , Werner Van Leekwijck , Luc Van Linden , René Govaerts , Joos Vandewalle Propagation Characteristics of Boolean Functions. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1990, pp:161-173 [Conf ] Joos Vandewalle , David Chaum , Walter Fumy , Cees J. A. Jansen , Peter Landrock , Gert Roelofsen A European Call For Cryptographic Algorithms: Ripe; Race Integrity Primitives Evaluation. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:267-271 [Conf ] Joos Vandewalle , René Govaerts , W. De Becker , Marc Decroos , G. Speybrouck Implementation Study of Public Key Cryptographic Protection in an Existing Electronic Mail and Document Handling System. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1985, pp:43-49 [Conf ] Ingrid Verbauwhede , Frank Hoornaert , Joos Vandewalle , Hugo De Man Security Considerations in the Design and Implementation of a new DES chip. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1987, pp:287-300 [Conf ] Frederik Vercauteren , Bart Preneel , Joos Vandewalle A Memory Efficient Version of Satoh's Algorithm. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2001, pp:1-13 [Conf ] Cristian Radu , René Govaerts , Joos Vandewalle Efficient Electronic Cash with Restricted Privacy. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1997, pp:57-70 [Conf ] Joan Daemen , René Govaerts , Joos Vandewalle A New Approach to Block Cipher Design. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1993, pp:18-32 [Conf ] Joan Daemen , René Govaerts , Joos Vandewalle Correlation Matrices. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1994, pp:275-285 [Conf ] Steve Babbage , Christophe De Cannière , Joseph Lano , Bart Preneel , Joos Vandewalle Cryptanalysis of SOBER-t32. [Citation Graph (0, 0)][DBLP ] FSE, 2003, pp:111-128 [Conf ] Paulo S. L. M. Barreto , Vincent Rijmen , Jorge Nakahara Jr. , Bart Preneel , Joos Vandewalle , Hae Yong Kim Improved SQUARE Attacks against Reduced-Round HIEROCRYPT. [Citation Graph (0, 0)][DBLP ] FSE, 2001, pp:165-173 [Conf ] Johan Borst , Bart Preneel , Joos Vandewalle Linear Cryptanalysis of RC5 and RC6. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1999, pp:16-30 [Conf ] Jorge Nakahara Jr. , Bart Preneel , Joos Vandewalle Linear Cryptanalysis of Reduced-Round Versions of the SAFER Block Cipher Family. [Citation Graph (0, 0)][DBLP ] FSE, 2000, pp:244-261 [Conf ] Vincent Rijmen , Bart Van Rompay , Bart Preneel , Joos Vandewalle Producing Collisions for PANAMA. [Citation Graph (0, 0)][DBLP ] FSE, 2001, pp:37-51 [Conf ] Lieven De Lathauwer , Luc Hoegaerts , Joos Vandewalle A Grassmann-Rayleigh Quotient Iteration for Dimensionality Reduction in ICA. [Citation Graph (0, 0)][DBLP ] ICA, 2004, pp:335-342 [Conf ] Lieven De Lathauwer , Joos Vandewalle Dimensionality Reduction in ICA and Rank-(R1 , R2 , ..., RN ) Reduction in Multilinear Algebra. [Citation Graph (0, 0)][DBLP ] ICA, 2004, pp:295-302 [Conf ] Jos De Brabanter , Kristiaan Pelckmans , Johan A. K. Suykens , Joos Vandewalle Robust Cross-Validation Score Function for Non-linear Function Estimation. [Citation Graph (0, 0)][DBLP ] ICANN, 2002, pp:713-719 [Conf ] Tony Van Gestel , Johan A. K. Suykens , Jos De Brabanter , Bart De Moor , Joos Vandewalle Kernel Canonical Correlation Analysis and Least Squares Support Vector Machines. [Citation Graph (0, 0)][DBLP ] ICANN, 2001, pp:384-389 [Conf ] Yves Moreau , Herman Verrelst , Joos Vandewalle Detection of Mobile Phone Fraud Using Supervised Neural Networks: A First Prototype. [Citation Graph (0, 0)][DBLP ] ICANN, 1997, pp:1065-1070 [Conf ] René Govaerts , Yvo Desmedt , Joos Vandewalle Cryptography: How to Attack, What to Protect? [Citation Graph (0, 0)][DBLP ] ICC (1), 1984, pp:175-178 [Conf ] Alex Biryukov , Jorge Nakahara Jr. , Bart Preneel , Joos Vandewalle New Weak-Key Classes of IDEA. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:315-326 [Conf ] Luc Hoegaerts , Johan A. K. Suykens , Joos Vandewalle , Bart De Moor A Comparison of Pruning Algorithms for Sparse Least Squares Support Vector Machines. [Citation Graph (0, 0)][DBLP ] ICONIP, 2004, pp:1247-1253 [Conf ] Richard Chibanga , Jean Berlamont , Joos Vandewalle Artificial Neural Networks in Hydrological Watershed Modeling: Surface Flow Contribution from the Ungauged Parts of a Catchment. [Citation Graph (0, 0)][DBLP ] ICTAI, 2001, pp:367-374 [Conf ] Cristian Radu , René Govaerts , Joos Vandewalle Prepaid Electronic Cheques Using Public-Key Certificates. [Citation Graph (0, 0)][DBLP ] IMA Conf., 1995, pp:132-141 [Conf ] Cristian Radu , René Govaerts , Joos Vandewalle Witness Hiding Restrictive Blind Signature Scheme. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1997, pp:283-294 [Conf ] Ventzislav Nikov , Svetla Nikova , Bart Preneel , Joos Vandewalle On Unconditionally Secure Distributed Oblivious Transfer. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2002, pp:395-408 [Conf ] Ventzislav Nikov , Svetla Nikova , Bart Preneel , Joos Vandewalle On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2002, pp:422-436 [Conf ] Siddika Berna Örs , Lejla Batina , Bart Preneel , Joos Vandewalle Hardware Implementation of a Montgomery Modular Multiplier in a Systolic Array. [Citation Graph (0, 0)][DBLP ] IPDPS, 2003, pp:184- [Conf ] Martin Hasler , Leon O. Chua , Josef A. Nossek , Ángel Rodríguez-Vázquez , Tamás Roska , Joos Vandewalle Cellular Neural Networks: the Analogic Microprocessor? [Citation Graph (0, 0)][DBLP ] ISCAS, 1994, pp:289-294 [Conf ] Johan A. K. Suykens , Joos Vandewalle Generalized Cellular Neural Networks Represented in he NLq Framework. [Citation Graph (0, 0)][DBLP ] ISCAS, 1995, pp:645-648 [Conf ] Johan A. K. Suykens , Mustak E. Yalcin , Joos Vandewalle Coupled chaotic simulated annealing processes. [Citation Graph (0, 0)][DBLP ] ISCAS (3), 2003, pp:582-585 [Conf ] Shaohua Tan , Jianbin Hao , Joos Vandewalle A New Learning Algorithm for RBF Neural Networks with Applications to Nonlinear System Identification. [Citation Graph (0, 0)][DBLP ] ISCAS, 1995, pp:1708-1711 [Conf ] Mustak E. Yalcin , Johan A. K. Suykens , Joos Vandewalle A double scroll based true random bit generator. [Citation Graph (0, 0)][DBLP ] ISCAS (4), 2004, pp:581-584 [Conf ] Mustak E. Yalcin , Johan A. K. Suykens , Joos Vandewalle Spatiotemporal pattern formation in the ACE16k CNN chip. [Citation Graph (0, 0)][DBLP ] ISCAS (6), 2005, pp:5814-5817 [Conf ] Mustak E. Yalcin , Johan A. K. Suykens , Joos Vandewalle On the realization of n-scroll attractors. [Citation Graph (0, 0)][DBLP ] ISCAS (5), 1999, pp:483-486 [Conf ] Jorge Nakahara Jr. , Bart Preneel , Joos Vandewalle A Note on Weak Keys of PES, IDEA, and Some Extended Variants. [Citation Graph (0, 0)][DBLP ] ISC, 2003, pp:267-279 [Conf ] Joris Claessens , Bart Preneel , Joos Vandewalle Combining World Wide Web and Wireless Security. [Citation Graph (0, 0)][DBLP ] Network Security, 2001, pp:153-172 [Conf ] Herman Verrelst , Yves Moreau , Joos Vandewalle , Dirk Timmerman Use of a Multi-Layer Perceptron to Predict Malignancy in Ovarian Tumors. [Citation Graph (0, 0)][DBLP ] NIPS, 1997, pp:- [Conf ] Michaël Quisquater , Bart Preneel , Joos Vandewalle On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2002, pp:199-210 [Conf ] Bert den Boer , Bart Van Rompay , Bart Preneel , Joos Vandewalle New (Two-Track-)MAC Based on the Two Trails of RIPEMD. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2001, pp:314-324 [Conf ] Yuri Borissov , Svetla Nikova , Bart Preneel , Joos Vandewalle On a Resynchronization Weakness in a Class of Combiners with Memory. [Citation Graph (0, 0)][DBLP ] SCN, 2002, pp:164-173 [Conf ] Audun Jøsang , F. Van Laenen , Svein J. Knapskog , Joos Vandewalle How to trust systems. [Citation Graph (0, 0)][DBLP ] SEC, 1997, pp:241-252 [Conf ] Joris Claessens , Mark Vandenwauver , Bart Preneel , Joos Vandewalle Setting up a Secure Web Server and Clients on an Intranet. [Citation Graph (0, 0)][DBLP ] WETICE, 1998, pp:295-300 [Conf ] Mark Vandenwauver , René Govaerts , Joos Vandewalle How Role Based Access Control is Implemented in SESAME. [Citation Graph (0, 0)][DBLP ] WETICE, 1997, pp:293-298 [Conf ] Jorge Nakahara Jr. , Vincent Rijmen , Bart Preneel , Joos Vandewalle The MESH Block Ciphers. [Citation Graph (0, 0)][DBLP ] WISA, 2003, pp:458-473 [Conf ] Nele Mentens , Siddika Berna Örs , Bart Preneel , Joos Vandewalle An FPGA Implementation of a Montgomery Multiplier Over GF(2^m). [Citation Graph (0, 0)][DBLP ] Computers and Artificial Intelligence, 2004, v:23, n:5, pp:- [Journal ] Joris Claessens , Valentin Dem , Danny De Cock , Bart Preneel , Joos Vandewalle On the Security of Today's Online Electronic Banking Systems. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:3, pp:253-265 [Journal ] Johan A. K. Suykens , Joos Vandewalle , Bart De Moor Intelligence and Cooperative Search by Coupled Local Minimizers [Citation Graph (0, 0)][DBLP ] CoRR, 2002, v:0, n:, pp:- [Journal ] Valeriu Beiu , J. A. Peperstraete , Joos Vandewalle , Rudy Lauwereins Closse Approximations of Sigmoid Functions by Sum of Step for VLSI Implementation of Neural Networks. [Citation Graph (0, 0)][DBLP ] Sci. Ann. Cuza Univ., 1994, v:3, n:, pp:5-34 [Journal ] Joris Claessens , Bart Preneel , Joos Vandewalle A Tangled World Wide Web of Security Issues. [Citation Graph (0, 0)][DBLP ] First Monday, 2002, v:7, n:3, pp:- [Journal ] Michel Duhoux , Johan A. K. Suykens , Bart De Moor , Joos Vandewalle Improved Long-Term Temperature Prediction by Chaining of Neural Networks. [Citation Graph (0, 0)][DBLP ] Int. J. Neural Syst., 2001, v:11, n:1, pp:1-10 [Journal ] Jianbin Hao , Joos Vandewalle A New Model of Neural Associative Memories. [Citation Graph (0, 0)][DBLP ] Int. J. Neural Syst., 1994, v:5, n:1, pp:39-47 [Journal ] Jianbin Hao , Joos Vandewalle , Shaohua Tan A Rule-Based Neural Controller For Inverted Pendulum System. [Citation Graph (0, 0)][DBLP ] Int. J. Neural Syst., 1993, v:4, n:1, pp:55-64 [Journal ] Jianbin Hao , Joos Vandewalle , Shaohua Tan Predictive Control of Nonlinear Systems Based on Identification by Backpropagation Networks. [Citation Graph (0, 0)][DBLP ] Int. J. Neural Syst., 1994, v:5, n:4, pp:335-344 [Journal ] Shaohua Tan , Jianbin Hao , Joos Vandewalle Pattern Storage and Hopfield Neural Associative Memory with Hidden Structure. [Citation Graph (0, 0)][DBLP ] Int. J. Neural Syst., 1992, v:3, n:3, pp:315-322 [Journal ] Luc Hoegaerts , Johan A. K. Suykens , Joos Vandewalle , Bart De Moor Subset based least squares subspace regression in RKHS. [Citation Graph (0, 0)][DBLP ] Neurocomputing, 2005, v:63, n:, pp:293-323 [Journal ] Johan A. K. Suykens , Jos De Brabanter , Lukas Lukas , Joos Vandewalle Weighted least squares support vector machines: robustness and sparse approximation. [Citation Graph (0, 0)][DBLP ] Neurocomputing, 2002, v:48, n:1-4, pp:85-105 [Journal ] Shaohua Tan , Jianbin Hao , Joos Vandewalle Efficient identification of RBF neural net models for nonlinear discrete-time multivariable dynamical systems. [Citation Graph (0, 0)][DBLP ] Neurocomputing, 1995, v:9, n:1, pp:11-26 [Journal ] Shaohua Tan , Joos Vandewalle On the design of feedforward neural networks for binary mappings. [Citation Graph (0, 0)][DBLP ] Neurocomputing, 1994, v:6, n:5, pp:565-582 [Journal ] Michel Verleysen , Joos Vandewalle Special issue on fundamental and information processing aspects of neurocomputing. [Citation Graph (0, 0)][DBLP ] Neurocomputing, 2002, v:48, n:1-4, pp:1-2 [Journal ] Joris Claessens , Bart Preneel , Joos Vandewalle Combining World Wide Web and wireless security. [Citation Graph (0, 0)][DBLP ] Informatica (Slovenia), 2002, v:26, n:2, pp:- [Journal ] Lejla Batina , Siddika Berna Örs , Bart Preneel , Joos Vandewalle Hardware architectures for public key cryptography. [Citation Graph (0, 0)][DBLP ] Integration, 2003, v:34, n:1-2, pp:1-64 [Journal ] Michaël Quisquater , Bart Preneel , Joos Vandewalle Spectral characterization of cryptographic Boolean functions satisfying the (extended) propagation criterion of degree l and order k . [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 2005, v:93, n:1, pp:25-28 [Journal ] Marc Moonen , Paul Van Dooren , Joos Vandewalle Jacobi-Type Algorithms for LDC and Cholesky Factorization. [Citation Graph (0, 0)][DBLP ] J. Parallel Distrib. Comput., 1991, v:13, n:1, pp:111-117 [Journal ] Marc Moonen , Joos Vandewalle A Jacobi-Type Systolic Algorithm for Riccati and Lyapunov Equations. [Citation Graph (0, 0)][DBLP ] J. Parallel Distrib. Comput., 1994, v:22, n:2, pp:314-320 [Journal ] Tony Van Gestel , Johan A. K. Suykens , Bart Baesens , Stijn Viaene , Jan Vanthienen , Guido Dedene , Bart De Moor , Joos Vandewalle Benchmarking Least Squares Support Vector Machine Classifiers. [Citation Graph (0, 0)][DBLP ] Machine Learning, 2004, v:54, n:1, pp:5-32 [Journal ] Bart De Moor , Lieven Vandenberghe , Joos Vandewalle The generalized linear complementarity problem and an algorithm to find all its solutions. [Citation Graph (0, 0)][DBLP ] Math. Program., 1992, v:57, n:, pp:415-426 [Journal ] Tony Van Gestel , Johan A. K. Suykens , Gert R. G. Lanckriet , Annemie Lambrechts , Bart De Moor , Joos Vandewalle Bayesian Framework for Least-Squares Support Vector Machine Classifiers, Gaussian Processes, and Kernel Fisher Discriminant Analysis. [Citation Graph (0, 0)][DBLP ] Neural Computation, 2002, v:14, n:5, pp:1115-1147 [Journal ] Yves Moreau , Stéphane Louiès , Joos Vandewalle , Léon Brenig Embedding recurrent neural networks into predator-prey models. [Citation Graph (0, 0)][DBLP ] Neural Networks, 1999, v:12, n:2, pp:237-245 [Journal ] Johan A. K. Suykens , Bart De Moor , Joos Vandewalle Static and dynamic stabilizing neural controllers, applicable to transition between equilibrium points. [Citation Graph (0, 0)][DBLP ] Neural Networks, 1994, v:7, n:5, pp:819-831 [Journal ] Johan A. K. Suykens , Bart De Moor , Joos Vandewalle NLq Theory: A Neural Control Framework with Global Asymptotic Stability Criteria. [Citation Graph (0, 0)][DBLP ] Neural Networks, 1997, v:10, n:4, pp:615-637 [Journal ] Johan A. K. Suykens , Joos Vandewalle , Bart De Moor Optimal control by least squares support vector machines. [Citation Graph (0, 0)][DBLP ] Neural Networks, 2001, v:14, n:1, pp:23-35 [Journal ] Luc Hoegaerts , Lieven De Lathauwer , Ivan Goethals , Johan A. K. Suykens , Joos Vandewalle , Bart De Moor Efficiently updating and tracking the dominant kernel principal components. [Citation Graph (0, 0)][DBLP ] Neural Networks, 2007, v:20, n:2, pp:220-229 [Journal ] Tony Van Gestel , Johan A. K. Suykens , Gert R. G. Lanckriet , Annemie Lambrechts , Bart De Moor , Joos Vandewalle Multiclass LS SVMs Moderated Outputs and Coding Decoding Schemes. [Citation Graph (0, 0)][DBLP ] Neural Processing Letters, 2002, v:15, n:1, pp:45-58 [Journal ] Johan A. K. Suykens , Joos Vandewalle Least Squares Support Vector Machine Classifiers. [Citation Graph (0, 0)][DBLP ] Neural Processing Letters, 1999, v:9, n:3, pp:293-300 [Journal ] Johan A. K. Suykens , Herman Verrelst , Joos Vandewalle On-Line Learning Fokker-Planck Machine. [Citation Graph (0, 0)][DBLP ] Neural Processing Letters, 1998, v:7, n:2, pp:81-89 [Journal ] Joos Vandewalle On the Calculation of the Piecewise Linear Approximation to a Discrete Function. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1975, v:24, n:8, pp:843-846 [Journal ] Gert Goossens , Jan M. Rabaey , Joos Vandewalle , Hugo De Man An efficient microcode compiler for application specific DSP processors. [Citation Graph (0, 0)][DBLP ] IEEE Trans. on CAD of Integrated Circuits and Systems, 1990, v:9, n:9, pp:925-937 [Journal ] Yvo Desmedt , Joos Vandewalle , René Govaerts A critical analysis of the security of knapsack public-key algorithms. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1984, v:30, n:4, pp:601-610 [Journal ] Michaël Quisquater , Bart Preneel , Joos Vandewalle A new inequality in discrete Fourier theory. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2003, v:49, n:8, pp:2038-2040 [Journal ] Joris Claessens , Bart Preneel , Joos Vandewalle (How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions. [Citation Graph (0, 0)][DBLP ] ACM Trans. Internet Techn., 2003, v:3, n:1, pp:28-48 [Journal ] Mustak E. Yalcin , Johan A. K. Suykens , Joos Vandewalle Multi-scroll and hypercube attractors from Josephson junctions. [Citation Graph (0, 0)][DBLP ] ISCAS, 2006, pp:- [Conf ] Cryptanalysis of a fast cryptographic checksum algorithm. [Citation Graph (, )][DBLP ] Search in 0.016secs, Finished in 0.020secs